Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    FreeRADIUS2+Accounting

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    15 Posts 3 Posters 6.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Alan87i
      last edited by

      Tonight Snap update , I had to save the CP page then save each user in radius2 before they were authenticated. With out doing so it just let them through.

      1 Reply Last reply Reply Quote 0
      • N
        Nachtfalke
        last edited by

        @Alan87i:

        Tonight Snap update , I had to save the CP page then save each user in radius2 before they were authenticated. With out doing so it just let them through.

        Are you sure you had to save EVERY user on freeradius2? When changing/editing one user then the complete file will be re-written. So no need to do that with every user.

        If you have accounting enabled on CP then you are able to see the logged in users on freeradius.
        go to console and use the "radwho" command on this file "/var//log/radutmp" - this file cannot be edited with "vi" or any other editor.

        Further check the "Portal Auth" syslog page when this problem occurs that the users have access without credentials.

        1 Reply Last reply Reply Quote 0
        • A
          Alan87i
          last edited by

          Your right I have to save at least 1 user in FR2 and open CP and save .
          A tid bit of the syslog before and after. The top of the log is after PF did an update .
          I let it sit for an hour. First thing I did was hit a page with both users(laptops) and I got through.
          Tonight I'll remove one user and see if it can connect after an update with out saving cp and FR2 user.

          Also you'll see each login writes 2 lines for login OK from radius.
          Even more weird is Bandwidthd pumping out 4 lines.

          Jun 28 06:15:00 	php: : The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
          Jun 28 06:15:03 	php: : The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
          Jun 28 06:15:05 	php: : The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
          Jun 28 06:15:08 	radiusd[43484]: Loaded virtual server <default>
          Jun 28 06:15:08 	radiusd[43779]: Ready to process requests.
          Jun 28 06:15:09 	php: : The command '/usr/local/etc/rc.d/bandwidthd.sh stop' returned exit code '1', the output was 'No matching processes were found'
          Jun 28 06:15:09 	kernel: em0: promiscuous mode disabled
          Jun 28 06:15:13 	bandwidthd: Monitoring subnet 192.168.1.0 with netmask 192.168.1.0
          Jun 28 06:15:13 	bandwidthd: Monitoring subnet 192.168.1.0 with netmask 192.168.1.0
          Jun 28 06:15:14 	bandwidthd: Opening em0
          Jun 28 06:15:14 	bandwidthd: Packet Encoding: Ethernet
          Jun 28 06:15:14 	kernel: em0: promiscuous mode enabled
          Jun 28 06:15:14 	bandwidthd: Opening em0
          Jun 28 06:15:14 	bandwidthd: Opening em0
          Jun 28 06:15:14 	bandwidthd: Opening em0
          Jun 28 06:15:14 	bandwidthd: Packet Encoding: Ethernet
          Jun 28 06:15:14 	bandwidthd: Packet Encoding: Ethernet
          Jun 28 06:15:14 	bandwidthd: Packet Encoding: Ethernet
          Jun 28 06:15:16 	login: login on ttyv0 as root
          Jun 28 06:15:16 	sshlockout[53380]: sshlockout/webConfigurator v3.0 starting up
          Jun 28 06:15:17 	check_reload_status: Reloading filter
          Jun 28 08:04:06 	check_reload_status: Syncing firewall
          Jun 28 08:04:06 	radiusd[43779]: Signalled to terminate
          Jun 28 08:04:06 	radiusd[43779]: Exiting normally.
          Jun 28 08:04:07 	php: /pkg_edit.php: The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
          Jun 28 08:04:09 	radiusd[44083]: Loaded virtual server <default>
          Jun 28 08:04:09 	radiusd[44196]: Ready to process requests.
          Jun 28 08:05:24 	check_reload_status: Syncing firewall
          Jun 28 08:05:25 	minicron: (/etc/rc.prunecaptiveportal) terminated by signal 15 (Terminated: 15)
          Jun 28 08:05:26 	check_reload_status: Reloading filter
          Jun 28 08:05:28 	radiusd[44196]: Login OK: [00:1e:ec:ad:45:29] (from client pfsense port 2 cli 00:1e:ec:ad:45:29)
          Jun 28 08:05:28 	radiusd[44196]: Login OK: [00:1e:ec:ad:45:29] (from client pfsense port 2 cli 00:1e:ec:ad:45:29)
          Jun 28 08:05:29 	root: FreeRADIUS: Used amount of daily traffic by 00:1e:ec:ad:45:29 is 5875 of 10000 MB! The user was accepted!!!
          Jun 28 08:05:50 	radiusd[44196]: Login OK: [00:1b:38:b0:e1:51] (from client pfsense port 4 cli 00:1b:38:b0:e1:51)
          Jun 28 08:05:50 	radiusd[44196]: Login OK: [00:1b:38:b0:e1:51] (from client pfsense port 4 cli 00:1b:38:b0:e1:51)
          Jun 28 08:05:50 	root: FreeRADIUS: Used amount of daily traffic by 00:1b:38:b0:e1:51 is 103 of 2048 MB! The user was accepted!!!</default></default>
          

          Also

          
          Enter an option: 8
          
          [2.1-BETA0][admin@pfsense.testing.com]/root(1): /var//log/radutmp radwho
          /var//log/radutmp: Permission denied.
          [2.1-BETA0][admin@pfsense.testing.com]/root(2):
          
          
          1 Reply Last reply Reply Quote 0
          • N
            Nachtfalke
            last edited by

            http://freeradius.org/radiusd/man/radwho.html

            
            [2.0.1-RELEASE][admin@pfsense1.hpa]/(9): radwho /var/log/radutmp
            Login      Name              What  TTY  When      From            Location
            
            

            PS: I do not have accounting enabled so no entries here.

            @Alan87i
            Can you please explain again step by step what you did.
            authenticated the user, all is working, updated pfsense, what isn't working.
            Thank you!

            1 Reply Last reply Reply Quote 0
            • A
              Alan87i
              last edited by

              After each snapshot upgrade.
              All packages are reinstalled.
              I have 2 users in radius.

              What I see is both users have access through the wan but CP and FR2 does not authenticate. No log entries CP user status is empty.

              I have to save 1 user in FR2 and save on the CP page . Then I see normal log entries and CP shows both users connected.
              before next snap I will remove one user and test too see if he is denied. Before following the re-save steps

              1 Reply Last reply Reply Quote 0
              • A
                Alan87i
                last edited by

                $ radwho /var/log/radutmp
                Login      Name              What  TTY  When      From            Location
                00:1b:38:b 00:1b:38:b0:e1:51 shell S2   Thu 10:23 192.168.1.1     192.168.1.101
                00:1e:ec:a 00:1e:ec:ad:45:29 shell S4   Thu 10:23 192.168.1.1     192.168.1.100
                00:1e:ec:a 00:1e:ec:ad:45:29 shell S6   Tue 09:52 192.168.1.1     192.168.1.100
                

                Just updated again too latest snap.
                This time I saved CP and tried and the users showed in the logs.

                1 Reply Last reply Reply Quote 0
                • N
                  Nachtfalke
                  last edited by

                  @Alan87i:

                  $ radwho /var/log/radutmp
                  Login      Name              What  TTY  When      From            Location
                  00:1b:38:b 00:1b:38:b0:e1:51 shell S2   Thu 10:23 192.168.1.1     192.168.1.101
                  00:1e:ec:a 00:1e:ec:ad:45:29 shell S4   Thu 10:23 192.168.1.1     192.168.1.100
                  00:1e:ec:a 00:1e:ec:ad:45:29 shell S6   Tue 09:52 192.168.1.1     192.168.1.100
                  

                  Just updated again too latest snap.
                  This time I saved CP and tried and the users showed in the logs.

                  Correct me if I am wrong:
                  1.) After the snapshot update you didn't change anything on FR2?
                  2.) After the snapshot update you clicked "Save" on the CP page ?
                  3.) After that you ran the "radwho" command ?

                  a) Before you did step 2 - the user could connect to the internet without authentication ?
                  b) After you did step 2 - the used needed to authenticate on CP ?

                  Did you set any "Simultaneous-Use" settings on FR2? If yes - delete them. Uncheck the "Disable concurrent connections" on CP page.

                  Explanation about /var/log/radutmp:
                  This file only works when accounting is enabled
                  This file will be used by FR2 to check for simultaneous connections of a user. So when a user authenticates on CP then an accounting packet is sent from CP to FR2 and FR2 writs this user to the file. FR2 will first delete the user from this file if CP tell to do so. If CP is not doing than FR2 is not the fault. Your radwho output shows to connections from same MAC on different days (Tuesday + Thursday).

                  Can you please do the following:
                  The next time after you did an update go "Services" and stop FR2.
                  Then go to console and start FR2 with:

                  
                  /usr/local/etc/rc.d/radiusd -X
                  
                  

                  Then try to authenticate on CP and see the output of FR2 - or post the complete output here.

                  PS: what is happening if an user authenticated correct on PC and after that you just reboot pfsense and then again try to authenticte on CP. Will this work correct or not ?

                  1 Reply Last reply Reply Quote 0
                  • A
                    Alan87i
                    last edited by

                    Correct me if I am wrong:
                    1.) After the snapshot update you didn't change anything on FR2?

                    yes

                    2.) After the snapshot update you clicked "Save" on the CP page ?

                    yes

                    3.) After that you ran the "radwho" command ?

                    yes

                    a) Before you did step 2 - the user could connect to the internet without authentication ?

                    yes

                    b) After you did step 2 - the used needed to authenticate on CP ?

                    Yes happens automatically using mac auth 8.0x in FR2 shows up in log

                    Did you set any "Simultaneous-Use" settings on FR2? If yes - delete them. Uncheck the "Disable concurrent connections" on CP page.

                    Disable concurrent logins was checked  Now unchecked

                    Explanation about /var/log/radutmp:
                    This file only works when accounting is enabled
                    This file will be used by FR2 to check for simultaneous connections of a user. So when a user authenticates on CP then an accounting packet is sent from CP to FR2 and FR2 writs this user to the file. FR2 will first delete the user from this file if CP tell to do so. If CP is not doing than FR2 is not the fault. Your radwho output shows to connections from same MAC on different days (Tuesday + Thursday).

                    Can you please do the following:
                    The next time after you did an update go "Services" and stop FR2.
                    Then go to console and start FR2 with:

                    
                    /usr/local/etc/rc.d/radiusd -X
                    
                    

                    Then try to authenticate on CP and see the output of FR2 - or post the complete output here.

                    PS: what is happening if an user authenticated correct on PC and after that you just reboot pfsense and then again try to authenticte on CP. Will this work correct or not ?

                    I removed 1 of the 2 users . saved and rebooted PF.
                    After boot up both have internet.
                    restarted FR2 no change  / saved the 1 user FR2 no change.

                    Jun 28 12:37:52 	radiusd[55327]: Loaded virtual server <default>
                    Jun 28 12:37:52 	radiusd[55430]: Ready to process requests.
                    Jun 28 12:38:25 	radiusd[55430]: Signalled to terminate
                    Jun 28 12:38:25 	radiusd[55430]: Exiting normally.
                    Jun 28 12:38:25 	php: /status_services.php: The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
                    Jun 28 12:38:28 	radiusd[22872]: Loaded virtual server <default>
                    Jun 28 12:38:28 	radiusd[23092]: Ready to process requests.</default></default>
                    

                    Go too CP page click save

                    Jun 28 12:41:27 	check_reload_status: Syncing firewall
                    Jun 28 12:41:29 	minicron: (/etc/rc.prunecaptiveportal) terminated by signal 15 (Terminated: 15)
                    Jun 28 12:41:29 	check_reload_status: Reloading filter
                    Jun 28 12:41:51 	radiusd[23092]: Login OK: [00:1b:38:b0:e1:51] (from client pfsense port 2 cli 00:1b:38:b0:e1:51)
                    Jun 28 12:41:51 	radiusd[23092]: Login OK: [00:1b:38:b0:e1:51] (from client pfsense port 2 cli 00:1b:38:b0:e1:51)
                    Jun 28 12:41:51 	root: FreeRADIUS: Used amount of daily traffic by 00:1b:38:b0:e1:51 is 108 of 2048 MB! The user was accepted!!!
                    Jun 28 12:42:23 	radiusd[23092]: Login incorrect: [00:1e:ec:ad:45:29/blaa] (from client pfsense port 4 cli 00:1e:ec:ad:45:29)
                    Jun 28 12:42:23 	radiusd[23092]: Login incorrect: [00:1e:ec:ad:45:29/blaa] (from client pfsense port 4 cli 00:1e:ec:ad:45:29)
                    Jun 28 12:42:25 	radiusd[23092]: Login incorrect: [00:1e:ec:ad:45:29/blaa] (from client pfsense port 6 cli 00:1e:ec:ad:45:29)
                    Jun 28 12:42:25 	radiusd[23092]: Login incorrect: [00:1e:ec:ad:45:29/blaa] (from client pfsense port 6 cli 00:1e:ec:ad:45:29)
                    

                    And all seems fine after that.

                    1 Reply Last reply Reply Quote 0
                    • A
                      Alan87i
                      last edited by

                      
                      [2.1-BETA0][admin@pfsense.testing.com]/root(1): /usr/local/etc/rc.d/radiusd -X
                      /usr/local/etc/rc.d/radiusd: unknown directive '-X'.
                      Usage: /usr/local/etc/rc.d/radiusd [fast|force|one|quiet](start|stop|restart|rcvar|reload|debug|status|poll)
                      
                      
                        }
                       Module: Linked to module rlm_chap
                       Module: Instantiating module "chap" from file /usr/pbi/freeradius-i386/etc/raddb/modules/chap
                       Module: Linked to module rlm_mschap
                       Module: Instantiating module "mschap" from file /usr/pbi/freeradius-i386/etc/raddb/modules/mschap
                        mschap {
                              use_mppe = yes
                              require_encryption = no
                              require_strong = no
                              with_ntdomain_hack = yes
                              allow_retry = yes
                        }
                       Module: Instantiating module "motp" from file /usr/pbi/freeradius-i386/etc/raddb/modules/motp
                        exec motp {
                              wait = yes
                              program = "/usr/local/bin/bash /usr/pbi/freeradius-i386/etc/raddb/scripts/otpverify.sh %{request:User-Name} %{request:User-Password} %{reply:MOTP-Init-Secret} %{reply:MOTP-PIN} %{reply:MOTP-Offset}"
                              input_pairs = "request"
                              shell_escape = yes
                        }
                       Module: Linked to module rlm_digest
                       Module: Instantiating module "digest" from file /usr/pbi/freeradius-i386/etc/raddb/modules/digest
                       Module: Linked to module rlm_unix
                       Module: Instantiating module "unix" from file /usr/pbi/freeradius-i386/etc/raddb/modules/unix
                        unix {
                              radwtmp = "/var/log/radwtmp"
                        }
                       Module: Linked to module rlm_eap
                       Module: Instantiating module "eap" from file /usr/pbi/freeradius-i386/etc/raddb/eap.conf
                        eap {
                              default_eap_type = "md5"
                              timer_expire = 60
                              ignore_unknown_eap_types = no
                              cisco_accounting_username_bug = no
                              max_sessions = 4096
                        }
                       Module: Linked to sub-module rlm_eap_md5
                       Module: Instantiating eap-md5
                       Module: Linked to sub-module rlm_eap_leap
                       Module: Instantiating eap-leap
                       Module: Linked to sub-module rlm_eap_gtc
                       Module: Instantiating eap-gtc
                         gtc {
                              challenge = "Password: "
                              auth_type = "PAP"
                         }
                       Module: Linked to sub-module rlm_eap_tls
                       Module: Instantiating eap-tls
                         tls {
                              rsa_key_exchange = no
                              dh_key_exchange = yes
                              rsa_key_length = 512
                              dh_key_length = 512
                              verify_depth = 0
                              CA_path = "/usr/pbi/freeradius-i386/etc/raddb/certs"
                              pem_file_type = yes
                              private_key_file = "/usr/pbi/freeradius-i386/etc/raddb/certs/server.pem"
                              certificate_file = "/usr/pbi/freeradius-i386/etc/raddb/certs/server.pem"
                              CA_file = "/usr/pbi/freeradius-i386/etc/raddb/certs/ca.pem"
                              private_key_password = "whatever"
                              dh_file = "/usr/pbi/freeradius-i386/etc/raddb/certs/dh"
                              random_file = "/usr/pbi/freeradius-i386/etc/raddb/certs/random"
                              fragment_size = 1024
                              include_length = yes
                              check_crl = no
                              cipher_list = "DEFAULT"
                              ecdh_curve = "prime256v1"
                          cache {
                              enable = no
                              lifetime = 24
                              max_entries = 255
                          }
                          verify {
                          }
                          ocsp {
                              enable = no
                              override_cert_url = no
                              url = "http://127.0.0.1/ocsp/"
                          }
                         }
                       Module: Linked to sub-module rlm_eap_ttls
                       Module: Instantiating eap-ttls
                         ttls {
                              default_eap_type = "md5"
                              copy_request_to_tunnel = no
                              use_tunneled_reply = no
                              include_length = yes
                         }
                       Module: Linked to sub-module rlm_eap_peap
                       Module: Instantiating eap-peap
                         peap {
                              default_eap_type = "mschapv2"
                              copy_request_to_tunnel = no
                              use_tunneled_reply = no
                              proxy_tunneled_request_as_eap = yes
                              soh = no
                         }
                       Module: Linked to sub-module rlm_eap_mschapv2
                       Module: Instantiating eap-mschapv2
                         mschapv2 {
                              with_ntdomain_hack = no
                              send_error = no
                         }
                       Module: Checking authorize {...} for more modules to load
                       Module: Linked to module rlm_preprocess
                       Module: Instantiating module "preprocess" from file /usr/pbi/freeradius-i386/etc/raddb/modules/preprocess
                        preprocess {
                              huntgroups = "/usr/pbi/freeradius-i386/etc/raddb/huntgroups"
                              hints = "/usr/pbi/freeradius-i386/etc/raddb/hints"
                              with_ascend_hack = no
                              ascend_channels_per_line = 23
                              with_ntdomain_hack = no
                              with_specialix_jetstream_hack = no
                              with_cisco_vsa_hack = no
                              with_alvarion_vsa_hack = no
                        }
                       Module: Linked to module rlm_realm
                       Module: Instantiating module "suffix" from file /usr/pbi/freeradius-i386/etc/raddb/modules/realm
                        realm suffix {
                              format = "suffix"
                              delimiter = "@"
                              ignore_default = no
                              ignore_null = yes
                        }
                       Module: Instantiating module "ntdomain" from file /usr/pbi/freeradius-i386/etc/raddb/modules/realm
                        realm ntdomain {
                              format = "prefix"
                              delimiter = "\"
                              ignore_default = no
                              ignore_null = yes
                        }
                       Module: Linked to module rlm_files
                       Module: Instantiating module "files" from file /usr/pbi/freeradius-i386/etc/raddb/modules/files
                        files {
                              usersfile = "/usr/pbi/freeradius-i386/etc/raddb/users"
                              acctusersfile = "/usr/pbi/freeradius-i386/etc/raddb/acct_users"
                              preproxy_usersfile = "/usr/pbi/freeradius-i386/etc/raddb/preproxy_users"
                              compat = "no"
                        }
                       Module: Linked to module rlm_checkval
                       Module: Instantiating module "checkval" from file /usr/pbi/freeradius-i386/etc/raddb/modules/checkval
                        checkval {
                              item-name = "Calling-Station-Id"
                              check-name = "Calling-Station-Id"
                              data-type = "string"
                              notfound-reject = no
                        }
                      rlm_checkval: Registered name Calling-Station-Id for attribute 31
                       Module: Checking preacct {...} for more modules to load
                       Module: Checking accounting {...} for more modules to load
                       Module: Linked to module rlm_detail
                       Module: Instantiating module "detail" from file /usr/pbi/freeradius-i386/etc/raddb/modules/detail
                        detail {
                              detailfile = "/var/log/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
                              header = "%t"
                              detailperm = 384
                              dirperm = 493
                              locking = no
                              log_packet_header = no
                        }
                       Module: Instantiating module "datacounterdaily" from file /usr/pbi/freeradius-i386/etc/raddb/modules/datacounter_acct
                        exec datacounterdaily {
                              wait = yes
                              program = "/bin/sh /usr/pbi/freeradius-i386/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} daily %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
                              input_pairs = "request"
                              shell_escape = yes
                        }
                       Module: Instantiating module "datacounterweekly" from file /usr/pbi/freeradius-i386/etc/raddb/modules/datacounter_acct
                        exec datacounterweekly {
                              wait = yes
                              program = "/bin/sh /usr/pbi/freeradius-i386/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} weekly %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
                              input_pairs = "request"
                              shell_escape = yes
                        }
                       Module: Instantiating module "datacountermonthly" from file /usr/pbi/freeradius-i386/etc/raddb/modules/datacounter_acct
                        exec datacountermonthly {
                              wait = yes
                              program = "/bin/sh /usr/pbi/freeradius-i386/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} monthly %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
                              input_pairs = "request"
                              shell_escape = yes
                        }
                       Module: Instantiating module "datacounterforever" from file /usr/pbi/freeradius-i386/etc/raddb/modules/datacounter_acct
                        exec datacounterforever {
                              wait = yes
                              program = "/bin/sh /usr/pbi/freeradius-i386/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} forever %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
                              input_pairs = "request"
                              shell_escape = yes
                        }
                       Module: Linked to module rlm_radutmp
                       Module: Instantiating module "radutmp" from file /usr/pbi/freeradius-i386/etc/raddb/modules/radutmp
                        radutmp {
                              filename = "/var/log/radutmp"
                              username = "%{User-Name}"
                              case_sensitive = yes
                              check_with_nas = yes
                              perm = 384
                              callerid = yes
                        }
                       Module: Linked to module rlm_attr_filter
                       Module: Instantiating module "attr_filter.accounting_response" from file /usr/pbi/freeradius-i386/etc/raddb/modules/attr_filter
                        attr_filter attr_filter.accounting_response {
                              attrsfile = "/usr/pbi/freeradius-i386/etc/raddb/attrs.accounting_response"
                              key = "%{User-Name}"
                              relaxed = no
                        }
                       Module: Checking session {...} for more modules to load
                       Module: Checking pre-proxy {...} for more modules to load
                       Module: Instantiating module "attr_filter.pre-proxy" from file /usr/pbi/freeradius-i386/etc/raddb/modules/attr_filter
                        attr_filter attr_filter.pre-proxy {
                              attrsfile = "/usr/pbi/freeradius-i386/etc/raddb/attrs.pre-proxy"
                              key = "%{Realm}"
                              relaxed = no
                        }
                       Module: Checking post-proxy {...} for more modules to load
                       Module: Instantiating module "attr_filter.post-proxy" from file /usr/pbi/freeradius-i386/etc/raddb/modules/attr_filter
                        attr_filter attr_filter.post-proxy {
                              attrsfile = "/usr/pbi/freeradius-i386/etc/raddb/attrs"
                              key = "%{Realm}"
                              relaxed = no
                        }
                       Module: Checking post-auth {...} for more modules to load
                       Module: Instantiating module "attr_filter.access_reject" from file /usr/pbi/freeradius-i386/etc/raddb/modules/attr_filter
                        attr_filter attr_filter.access_reject {
                              attrsfile = "/usr/pbi/freeradius-i386/etc/raddb/attrs.access_reject"
                              key = "%{User-Name}"
                              relaxed = no
                        }
                       } # modules
                      } # server
                      radiusd: #### Opening IP addresses and Ports ####
                      listen {
                              type = "auth"
                              ipaddr = 192.168.1.1
                              port = 1812
                      }
                      listen {
                              type = "acct"
                              ipaddr = 192.168.1.1
                              port = 1813
                      }
                      listen {
                              type = "status"
                              ipaddr = 192.168.1.1
                              port = 1816
                      }
                      Listening on authentication address 192.168.1.1 port 1812
                      Listening on accounting address 192.168.1.1 port 1813
                      Listening on status address 192.168.1.1 port 1816
                      Listening on proxy address 192.168.1.1 port 1814
                      Ready to process requests.
                      
                      ```was all I could capture from that command in the window
                      
                      This post all after the latest snap . Again I had too only open CP and click save on the first page.
                      Before that all devices had access.
                      1 Reply Last reply Reply Quote 0
                      • N
                        Nachtfalke
                        last edited by

                        Ok, but this all seems to indicate a CP issue.
                        Do you have the same problem when you just reboot pfsense or is it only after a snapshot update ?

                        1 Reply Last reply Reply Quote 0
                        • A
                          Alan87i
                          last edited by

                          Just a reboot causes the same problem Not authorized connected pc's have full access until I save the main CP page .

                          1 Reply Last reply Reply Quote 0
                          • N
                            Nachtfalke
                            last edited by

                            @Alan87i:

                            Just a reboot causes the same problem Not authorized connected pc's have full access until I save the main CP page .

                            Ok, then you should probably open a new thread containing a well chosen headline like "CaptivePortal does not authenticate users after reboot against RADIUS".

                            Or you can open a ticket on redmine.pfsense.org

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.